Cyber Tactical Database API

MaliciousUri

getMaliciousURIs

List of Malicious Entry URI in Cyber Tactical Database

Return list of Malicious Entry URI in Cyber Tactical Database


/malicious/uri

Usage and SDK Samples

curl -X GET -H "x-api-key: [[apiKey]]" "http://api.ctd.activedefense.co.jp/v2/malicious/uri?type="
import io.swagger.client.*;
import io.swagger.client.auth.*;
import io.swagger.client.model.*;
import io.swagger.client.api.MaliciousUriApi;

import java.io.File;
import java.util.*;

public class MaliciousUriApiExample {

    public static void main(String[] args) {
        ApiClient defaultClient = Configuration.getDefaultApiClient();
        
        // Configure API key authorization: APIKeyHeader
        ApiKeyAuth APIKeyHeader = (ApiKeyAuth) defaultClient.getAuthentication("APIKeyHeader");
        APIKeyHeader.setApiKey("YOUR API KEY");
        // Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null)
        //APIKeyHeader.setApiKeyPrefix("Token");

        MaliciousUriApi apiInstance = new MaliciousUriApi();
        String type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
        try {
            array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
            System.out.println(result);
        } catch (ApiException e) {
            System.err.println("Exception when calling MaliciousUriApi#getMaliciousURIs");
            e.printStackTrace();
        }
    }
}
import io.swagger.client.api.MaliciousUriApi;

public class MaliciousUriApiExample {

    public static void main(String[] args) {
        MaliciousUriApi apiInstance = new MaliciousUriApi();
        String type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
        try {
            array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
            System.out.println(result);
        } catch (ApiException e) {
            System.err.println("Exception when calling MaliciousUriApi#getMaliciousURIs");
            e.printStackTrace();
        }
    }
}
Configuration *apiConfig = [Configuration sharedConfig];

// Configure API key authorization: (authentication scheme: APIKeyHeader)
[apiConfig setApiKey:@"YOUR_API_KEY" forApiKeyIdentifier:@"x-api-key"];
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
//[apiConfig setApiKeyPrefix:@"Bearer" forApiKeyIdentifier:@"x-api-key"];

String *type = type_example; // \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional)

MaliciousUriApi *apiInstance = [[MaliciousUriApi alloc] init];

// List of Malicious Entry URI in Cyber Tactical Database
[apiInstance getMaliciousURIsWith:type
              completionHandler: ^(array[MaliciousUri] output, NSError* error) {
                            if (output) {
                                NSLog(@"%@", output);
                            }
                            if (error) {
                                NSLog(@"Error: %@", error);
                            }
                        }];
var CyberTacticalDatabaseApi = require('cyber_tactical_database_api');
var defaultClient = CyberTacticalDatabaseApi.ApiClient.instance;

// Configure API key authorization: APIKeyHeader
var APIKeyHeader = defaultClient.authentications['APIKeyHeader'];
APIKeyHeader.apiKey = "YOUR API KEY"
// Uncomment the following line to set a prefix for the API key, e.g. "Token" (defaults to null)
//APIKeyHeader.apiKeyPrefix['x-api-key'] = "Token"

var api = new CyberTacticalDatabaseApi.MaliciousUriApi()

var opts = { 
  'type': type_example // {String} \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.
};

var callback = function(error, data, response) {
  if (error) {
    console.error(error);
  } else {
    console.log('API called successfully. Returned data: ' + data);
  }
};
api.getMaliciousURIs(opts, callback);
using System;
using System.Diagnostics;
using IO.Swagger.Api;
using IO.Swagger.Client;
using IO.Swagger.Model;

namespace Example
{
    public class getMaliciousURIsExample
    {
        public void main()
        {
            
            // Configure API key authorization: APIKeyHeader
            Configuration.Default.ApiKey.Add("x-api-key", "YOUR_API_KEY");
            // Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
            // Configuration.Default.ApiKeyPrefix.Add("x-api-key", "Bearer");

            var apiInstance = new MaliciousUriApi();
            var type = type_example;  // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional) 

            try
            {
                // List of Malicious Entry URI in Cyber Tactical Database
                array[MaliciousUri] result = apiInstance.getMaliciousURIs(type);
                Debug.WriteLine(result);
            }
            catch (Exception e)
            {
                Debug.Print("Exception when calling MaliciousUriApi.getMaliciousURIs: " + e.Message );
            }
        }
    }
}
<?php
require_once(__DIR__ . '/vendor/autoload.php');

// Configure API key authorization: APIKeyHeader
Swagger\Client\Configuration::getDefaultConfiguration()->setApiKey('x-api-key', 'YOUR_API_KEY');
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// Swagger\Client\Configuration::getDefaultConfiguration()->setApiKeyPrefix('x-api-key', 'Bearer');

$api_instance = new Swagger\Client\Api\MaliciousUriApi();
$type = type_example; // String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.

try {
    $result = $api_instance->getMaliciousURIs($type);
    print_r($result);
} catch (Exception $e) {
    echo 'Exception when calling MaliciousUriApi->getMaliciousURIs: ', $e->getMessage(), PHP_EOL;
}
?>
use Data::Dumper;
use WWW::SwaggerClient::Configuration;
use WWW::SwaggerClient::MaliciousUriApi;

# Configure API key authorization: APIKeyHeader
$WWW::SwaggerClient::Configuration::api_key->{'x-api-key'} = 'YOUR_API_KEY';
# uncomment below to setup prefix (e.g. Bearer) for API key, if needed
#$WWW::SwaggerClient::Configuration::api_key_prefix->{'x-api-key'} = "Bearer";

my $api_instance = WWW::SwaggerClient::MaliciousUriApi->new();
my $type = type_example; # String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.

eval { 
    my $result = $api_instance->getMaliciousURIs(type => $type);
    print Dumper($result);
};
if ($@) {
    warn "Exception when calling MaliciousUriApi->getMaliciousURIs: $@\n";
}
from __future__ import print_statement
import time
import swagger_client
from swagger_client.rest import ApiException
from pprint import pprint

# Configure API key authorization: APIKeyHeader
swagger_client.configuration.api_key['x-api-key'] = 'YOUR_API_KEY'
# Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
# swagger_client.configuration.api_key_prefix['x-api-key'] = 'Bearer'

# create an instance of the API class
api_instance = swagger_client.MaliciousUriApi()
type = type_example # String | \"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists. (optional)

try: 
    # List of Malicious Entry URI in Cyber Tactical Database
    api_response = api_instance.get_malicious_ur_is(type=type)
    pprint(api_response)
except ApiException as e:
    print("Exception when calling MaliciousUriApi->getMaliciousURIs: %s\n" % e)

Parameters

Query parameters
Name Description
type
String
\"ek\" or \"dl_malware\" is supported. If specified \"ek\", you can get Exploit Kit related uri lists. If specified \"dl_malware\", you can get malware related uri lists.

Responses

Status: 200 - successful operation


Generated 2018-10-14T17:38:31.589+09:00